
Open banking establishes new access to banks’ networks, creating additional security issues
As more markets adopt open banking — which mandates banks to open their systems to third parties — it will be increasingly critical for banks to ensure the security of not …

Mobile carriers believe security and reliability concerns will increase with 5G
Mobile service providers anticipate significant new revenue opportunities from the coming deployment of high-speed 5G networks and a host of new IoT-driven use cases, but they …

Senior payment executives’ thoughts on SME PCI compliance and security
Acquirers now hold higher expectations for compliance than they did 12 months ago, Sysnet Global Solutions has established. What is your current compliance rate? The annual …

Researchers discover highly stealthy Microsoft Exchange backdoor
An extremely stealthy Microsoft Exchange backdoor can read, modify or block emails going through the compromised mail server and even compose and send new emails. LightNeuron …

Bad actors increasingly spreading misinformation via social media ahead of EU elections
Bad actors are amplifying misinformation content directed at EU member states to shape public perception, a report by SafeGuard Cyber reveals. The report provides evidence and …

Unhackable? New chip makes the computer an unsolvable puzzle
A new computer processor architecture that could usher in a future where computers proactively defend against threats, rendering the current electronic security model of bugs …

C-Suite execs and policy makers find cybersecurity technology investments essential
The majority of C-Suite executives and policy makers in the United States believe investing in security software, infrastructure and emerging technologies is critical to …

Flaws in the design of IoT devices prevent them from notifying homeowners about problems
Design flaws in smart home Internet of Things (IoT) devices that allow third parties to prevent devices from sharing information have been identified by researchers at North …

Cryptographic breakthrough allows using handshake-style encryption for time-delayed communications
When spies meet, they use secret handshakes to confirm their identities, ensuring they are who they say they are. Now, researchers at Stevens Institute of Technology, and …

Network as a Service market to exceed $50bn by 2025
The Network as a Service market is poised to rise from $5 billion in 2018 to over $50 billion by 2025, according to a 2019 Global Market Insights report. Market growth drivers …

What will phishers do once push-based MFA becomes widely used?
As phishing continues to be the number one method for initiating a breach, investing in anti-phishing technologies or training – preferably both – should be a …

Flaw in pre-installed software opens Dell computers to remote hijack
Dell computer owners should update the Dell SupportAssist software as soon as possible to close a high-risk remote code execution vulnerability. What is Dell SupportAssist? …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware